Sciweavers

1744 search results - page 170 / 349
» The Steganographic File System
Sort
View
153
Voted
DAMON
2007
Springer
15 years 10 months ago
The five-minute rule twenty years later, and how flash memory changes the rules
In 1987, Gray and Putzolo presented the five-minute rule, which was reviewed and renewed ten years later in 1997. With the advent of flash memory in the gap between traditional RA...
Goetz Graefe
135
Voted
SSDBM
1999
IEEE
113views Database» more  SSDBM 1999»
15 years 8 months ago
Multidimensional Indexing and Query Coordination for Tertiary Storage Management
In many scientific domains, experimental devices or simulation programs generate large volumes of data. The volumes of data may reach hundreds of terabytes and therefore it is imp...
Arie Shoshani, Luis M. Bernardo, Henrik Nordberg, ...
103
Voted
CSE
2009
IEEE
15 years 10 months ago
Reinforcement Learning of Listener Response for Mood Classification of Audio
This paper describes a method of applying a reinforcement learning artificial intelligence to categorize audio files by mood based on listener response during a performance. The s...
Jack Stockholm, Philippe Pasquier
162
Voted
MM
2004
ACM
97views Multimedia» more  MM 2004»
15 years 9 months ago
Security of human video objects by incorporating a chaos-based feedback cryptographic scheme
Security of multimedia files attracts more and more attention and many encryption methods have been proposed in literature. However most cryptographic systems deal with multimedia...
Paraskevi K. Tzouveli, Klimis S. Ntalianis, Stefan...
DAC
1996
ACM
15 years 8 months ago
How to Write Awk and Perl Scripts to Enable Your EDA Tools to Work Together
1 Two tutorials are presented introducing the basic syntax and semantics of Awk and Perl. The languages are taught by example, and the same example EDA applications are developed i...
Robert C. Hutchins, Shankar Hemmady